Introducing G2.ai, the future of software buying.Try now

Compare F5 BIG-IP Access Policy Manager (APM) and Forescout Platform

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
F5 BIG-IP Access Policy Manager (APM)
F5 BIG-IP Access Policy Manager (APM)
Star Rating
(18)4.1 out of 5
Market Segments
Enterprise (76.5% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about F5 BIG-IP Access Policy Manager (APM)
Forescout Platform
Forescout Platform
Star Rating
(15)4.5 out of 5
Market Segments
Enterprise (57.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Forescout Platform

F5 BIG-IP Access Policy Manager (APM) vs Forescout Platform

  • Reviewers felt that F5 BIG-IP Access Policy Manager (APM) meets the needs of their business better than Forescout Platform.
  • When comparing quality of ongoing product support, reviewers felt that F5 BIG-IP Access Policy Manager (APM) is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Forescout Platform over F5 BIG-IP Access Policy Manager (APM).
Pricing
Entry-Level Pricing
F5 BIG-IP Access Policy Manager (APM)
No pricing available
Forescout Platform
No pricing available
Free Trial
F5 BIG-IP Access Policy Manager (APM)
No trial information available
Forescout Platform
No trial information available
Ratings
Meets Requirements
8.8
12
8.3
8
Ease of Use
8.8
12
9.2
8
Ease of Setup
Not enough data
8.7
5
Ease of Admin
Not enough data
8.0
5
Quality of Support
8.7
9
7.7
8
Has the product been a good partner in doing business?
Not enough data
8.7
5
Product Direction (% positive)
8.8
10
10.0
8
Features by Category
Not enough data
Not enough data
Authentication Options
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access Control Types
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Platform
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Authentication type
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Implementation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network Access Control (NAC)Hide 9 FeaturesShow 9 Features
Not enough data
9.0
6
Data
Not enough data
8.7
5
Not enough data
9.0
5
Not enough data
9.7
5
Network
Not enough data
8.6
6
Not enough data
8.9
6
Not enough data
8.7
5
Logistics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.3
5
Not enough data
Not enough data
Network Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Network Security Policy Management (NSPM)Hide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Network Maintenance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Risk Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Assesment
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Automation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
IoT Security SolutionsHide 12 FeaturesShow 12 Features
Not enough data
9.4
5
Connected Device Security
Not enough data
9.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.3
5
Not enough data
Not enough data
Not enough data
9.7
5
Platform
Not enough data
9.7
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
Not enough data
Not enough data
Asset Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Systems Management - OT Security Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Connected Device Security - OT Security Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting - OT Security Tools
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - OT Security Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Orchestration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Information
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Personalization
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Threat Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Orchestration, Automation, and Response (SOAR)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Automation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Orchestration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Response
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Platform
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
F5 BIG-IP Access Policy Manager (APM)
F5 BIG-IP Access Policy Manager (APM)
Forescout Platform
Forescout Platform
F5 BIG-IP Access Policy Manager (APM) and Forescout Platform are categorized as Network Access Control (NAC)
Reviews
Reviewers' Company Size
F5 BIG-IP Access Policy Manager (APM)
F5 BIG-IP Access Policy Manager (APM)
Small-Business(50 or fewer emp.)
0%
Mid-Market(51-1000 emp.)
23.5%
Enterprise(> 1000 emp.)
76.5%
Forescout Platform
Forescout Platform
Small-Business(50 or fewer emp.)
7.1%
Mid-Market(51-1000 emp.)
35.7%
Enterprise(> 1000 emp.)
57.1%
Reviewers' Industry
F5 BIG-IP Access Policy Manager (APM)
F5 BIG-IP Access Policy Manager (APM)
Information Technology and Services
23.5%
Telecommunications
17.6%
Retail
17.6%
Computer Software
11.8%
Marketing and Advertising
5.9%
Other
23.5%
Forescout Platform
Forescout Platform
Computer & Network Security
42.9%
Information Technology and Services
14.3%
Hospital & Health Care
14.3%
Security and Investigations
7.1%
Internet
7.1%
Other
14.3%
Alternatives
F5 BIG-IP Access Policy Manager (APM)
F5 BIG-IP Access Policy Manager (APM) Alternatives
Google Authenticator
Google Authenticator
Add Google Authenticator
Okta
Okta
Add Okta
Cisco Duo
Cisco Duo
Add Cisco Duo
BeyondTrust Remote Support
BeyondTrust Remote Support
Add BeyondTrust Remote Support
Forescout Platform
Forescout Platform Alternatives
Okta
Okta
Add Okta
Cisco Duo
Cisco Duo
Add Cisco Duo
SolarWinds Observability
SolarWinds Observability
Add SolarWinds Observability
Wiz
Wiz
Add Wiz
Discussions
F5 BIG-IP Access Policy Manager (APM)
F5 BIG-IP Access Policy Manager (APM) Discussions
Monty the Mongoose crying
F5 BIG-IP Access Policy Manager (APM) has no discussions with answers
Forescout Platform
Forescout Platform Discussions
Monty the Mongoose crying
Forescout Platform has no discussions with answers